10 Steps to Deter or Mitigate Terror Attacks

The Treadstone Group provides advice on protecting people, property, and information

Contributors: James Earl

An expert on physical security and terrorism avoidance, Ross D. Bulla, president of Charlotte, NC-based The Treadstone Group Inc., offers the following 10 procedures that can be utilized at private-sector and government facilities, which, when properly utilized, can deter or mitigate terror attacks.

Enforce a standoff zone.A standoff zone is a secure area in which only pre-screened vehicles, bicycles, etc. are allowed to enter. A 100- to 300-foot standoff zone is ideal, but the effects from a blast are decreased in direct correlation to the increase in distance between a blast and its intended target. Therefore, even a 10-foot standoff zone is better than no standoff zone. Bollards, barriers, and barricades (natural and man-made) are used to enforce the integrity of the standoff zone.

Implement surveillance detection.Nearly every major terrorist attack has been preceded by months and years of surveillance. Initial surveillance is usually conducted by amateurs or unwitting accomplices (children, taxi drivers, delivery/service persons, etc.) paid to take photographs, provide facility descriptions, or obtain other information (or information is surreptitiously elicited from them). Once a target list is narrowed, comprehensive surveillance is conducted by “professional” operators. Security personnel should be trained to observe and report unusual interest in a facility or activities that are out of context for the environment (e.g. taxi driver photographing a service entrance). As planning progresses, operators may conduct tests or dry runs, such as attempting to enter a restricted door to test the security response, or driving the intended route to identify potential obstacles.

Screen deliveries.All delivery, service, and courier vehicles and their contents should be screened using the following procedures: a) deliveries, other than courier services, should be scheduled in advance, and drivers should be required to present a bill of lading that reflects the driver’s name and a password issued by the Receiving Department; b) all drivers, including couriers, and their assistants should present photo identification and their presence should be documented; c) all license tags should be documented; d) ideally, cargo areas should be inspected by security at a remote location and sealed by security or a receiving clerk/dock master; e) all incoming parcels should be x-rayed or physically inspected; f) no parcels should be accepted anywhere other than at the designated receiving areas.

Stagger security.The number of security personnel on-duty, as well as the times during which shifts change, should vary each day to eliminate a discernable pattern. When conducting patrols, security personnel should use random start and finish times and vary their routes (at times, even suddenly changing direction or backtracking). If possible, vary the methods of patrol (vehicle, bicycle, walking). The use of both uniformed and “plain clothed” security personnel is advantageous.

Facilitate evacuation.During non-business hours, facility management personnel, including the property manager, chief engineer, and security director, should conduct an evacuation drill using only emergency lighting in the emergency exit stairways. This enables them to mimic, as closely as possible, a real life emergency scenario. Often, these “evacuees” identify critical hindrances in stairways, such as: a) the need for additional emergency lighting on each landing; b) the benefit of luminous paint, decals, and/or signs, at floor and eye levels, to highlight primary and secondary escape routes; c) the need for public address speakers in the stairways, so evacuees can hear important announcements. Where possible, stairways should be widened, and separate stairways should be provided for exclusive use by emergency personnel. (Evacuees often block access by firefighters.) Stairways should never exit into public lobbies.

Screen visitors.Where possible, screen visitors at a remote location, distant from any facilities. Visitors should be scheduled in advance by their hosts, and hosts should be required to escort visitors at all times. Visitors should present government-issued photo identifications, which should be held until their visitors’ passes are returned. (This is known as a credential-exchange program.) Hand-carried belongings should be visually inspected or x-rayed, and persons should be required to pass through a magnetometer. Outerwear, such as jackets and coats, should be opened and/or removed for inspection.

Screen employees.All employees should be required to wear facility-issued photo identification at eye level on their outermost garments. The use of access cards is recommended, and is best when used in conjunction with biometric or keypad systems. Always verify either electronically or visually that the card holder is the person to whom the card is issued; and never assume that an employee with whom you are acquainted is still employed at the facility.

Review your emergency procedures.Know what to do and when to do it. Review and, if necessary, update your security, evacuation, and life safety procedures and policies.

Make security the responsibility of all users.Everyone that works at your facility should be reminded continuously to observe and report unusual behavior. Users should challenge those who appear lost or are not known to them. For example, a person walking through tenant office space should be asked, “May I help you?” Simply acknowledging them and removing their anonymity might deter a potential incident.

Assess your security.Retain a security consultant to assess your physical, technical, and operational security. Where possible, their involvement early in the architectural, engineering, landscape design, and construction phases can help to avoid costly rectification later. Experts that are Board Certified in Security Management (CPP) and Board Certified in Physical Security (PSP) can best manage the complexity of regulatory, legislative, and best practices changes, and use them to guide their recommendations. Importantly, security consultants must be independent of affiliation with any product or service, thus ensuring that the services they render are in the best interests of the client.

This information was reprinted with permission by Ross D. Bulla, president of Charlotte, NC-based The Treadstone Group Inc., which provides security consulting and investigative services to corporations, law firms, government agencies, and private clients. To find out more about The Treadstone Group, visit(www.treadstone.biz) or call (704) 489-8663.

Visit our website today to learn about the design flexibility of a Morton building and the endless possibilities of partnering with our designBUILD team.

Wood construction is both cost and energy efficient. Check out Morton Buildings and our designBUILD team online today to discover all the benefits of post-frame construction.

The BUILDINGS brand serves commercial building owners and facilities management professionals for commercial real estate. BUILDINGS brand offers its audience of commercial building owners and facilities management professionals information on the development, construction, modernization, management and operations of commercial buildings as well as the products and services needed to support such commercial buildings and facilities management. With the information we offer, we help facilities management professionals make smarter decisions for commercial buildings.

BUILDINGS delivers relevant and timely information that equips commercial building owners and facilities management professionals with the knowledge and support they need to solve critical issues; energy management, lowering operating costs, new products for commercial buildings, security, and much more.

In addition to content, BUILDINGS features a comprehensive list of products and services and is your link to the companies that provide these valuable facilities management and commercial buildings resources.

You also have the opportunity to maintain your commercial buildings certifications with BUILDINGS. Continuing Education Units are available with approved content from BOMI.